Between marketers and malware, spam has some powerful perpetrators. Technologies such as fast-flux DNS, which uses a large number of servers and quick-changing domain records, have created botnets with spamming zombies that are hard to take down. In fact,
8 of 12
With challenge-response authentication, one party presents a question (the challenge) and another party must provide a valid answer (the response) to be authenticated. Challenge-response systems are not suitable for any organizati
Cameron Sturdevant has been with the Labs since 1997, and before that paid his IT management dues at a software publishing firm working with several Fortune 100 companies. Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility, with a focus on Android in the enterprise. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his reviews and analysis are grounded in real-world concern. Cameron is a regular speaker at Ziff-Davis Enterprise online and face-to-face events. Follow Cameron on Twitter at csturdevant, or reach him by email at email@example.com.